Cryptography Reference
In-Depth Information
of the various schemes compared demonstrate that the visual quality of the
stego-images generated by our scheme is the best. This is the second advan-
tage of our scheme over earlier work. The third advantage of our scheme over
past work is that, based on the check bits embedded, our scheme provides an
effective solution for verifying the reliability of the set of collected shadows
in the context of low computational complexity. Furthermore, experiments
confirm that our proposed scheme is suitable for real-time applications.
Bibliography
[1] A. Adhikari, and S. Sikdar, A New (2, n)-Visual Threshold Scheme for
Color Images, INDOCRYPT 2003, Lecture Notes in Computer Science,
Vol. 2904, pp. 148{161, 2003.
[2] G. R. Blakley, Safe guarding Cryptographic Keys, Proceedings of the Na-
tional Computer Conference, American Federation of Information Pro-
cessing Societies, Seoul, Korea, pp. 313{317, 1979.
[3] C. Blundo, A. D. Santis, and M. Naor, Visual Cryptography for Grey
Level Images, Information Processing Letters, Vol. 27, pp. 255{259, 2000.
[4] C.-C. Chang, C.-C. Lin, C.-H. Lin, and Y.-H. Chen, A Novel Secret Image
Sharing Scheme in Color Images Using Small Shadow Images, Informa-
tion Sciences, Vol. 178, No. 11, pp. 2433{2447, 2008.
[5] Y. F. Chen, Y. K. Chan, C. C. Huang, et. al, A Multiple-Level Visual
Secret-Sharing Scheme Without Image Size Expansion, Information Sci-
ences, Vol. 177, No. 21, Part II, pp. 4696{4710, 2007.
[6] C. C. Chang, C. C. Lin, T. H. N. Le, and B. H. Le, A Probabilistic Visual
Secret Sharing Scheme for Grayscale Images with Voting Strategy, Intelli-
gent Information Hiding and Multimedia Signal Processing, pp. 184{188,
2008.
[7] C. C. Chang, C. C. Lin, T. H. N. Le, and B. H. Le, A New Probabilistic
Visual Secret Sharing Scheme for Color Images, International Symposium
on Electronic Commerce and Security, pp. 1305{1308, 2008.
[8] S. Cimato, R. De Prisco, and A. De Santis, Probabilistic Visual Cryp-
tography Schemes, The Computer Journal, Vol. 49, No. 1, pp. 97{107,
2006.
[9] C.-C. Chang, Y.-P. Hsieh, and C.-H. Lin, Sharing Secrets in Stego-Images
with Authentication, Pattern Recognition, Vol. 41, No. 10, pp. 3130{3137,
2008.
 
 
Search WWH ::




Custom Search